Use our LinkedIn Login to download this post to PDF or save it to MyLibrary!

p r e f e r r e d - v e n d o r
What Is MyLibrary?

Norse Live Mpa

Every day, U.S. businesses experience thousands of attempted hacker intrusions (see a live map here).

With cybercrime on the rise globally, it’s important to understand some of the motivation behind cybercrime.

Since hackers can have a negative impact on a business, it’s important for companies to have a variety of ways to reduce the risk of hacking.

In addition, it’s essential for human resource managers to understand the risks of hackers.

Simple Beginnings

Early hackers would often break into computers for the sheer thrill of success.

In many cases, breaking into a computer could prove that one had a unique set of skills that others didn’t have.

In some cases, hackers would deface websites and graffiti them with vanity information about themselves.

Today’s Hacker

While hackers still engage in these types of activities, modern hacking has turned into a business.

In many cases, hackers will break into computer systems to steal proprietary business information that can benefit their clients.

For example, there are thousands of hacking attempts that originate in China every day.

Since China recently made the transition from communism to state capitalism, many entrepreneurs in this country are looking to produce modern goods and services.

Unfortunately, China doesn’t have a long history of technological innovation and research behind it.

Because of this, some in China will often resort to theft to get what it wants.

For example, Chinese businesses will often steal cell phone designs, vehicle blueprints, manufacturing processes, medication research, scientific research, computer technology and much more.

More examples, there have been a number of cases where companies, like ZTE and Huawei several years ago, had stolen data from companies like Apple to create smartphones and other consumer electronics.

By copying the designs of American manufacturers, Chinese companies can benefit from the research carried out by another group.

Hacker Strategies Are Getting Complex

In addition, it’s important to understand how cyber criminals will use malware and hacking techniques to steal money.

Every day, millions of people around the world use computers to send and receive important financial data.

This can include banking passwords, routing numbers and more. If a hacker is able to steal this information, he or she may be able to clear out a bank account.

Hackers will also hijack computers to turn them into spam machines.

For example, imagine that an individual has downloaded a program from a file-sharing service or other nefarious sources.

In many cases, these types of downloads can contain malware and other viruses.

When an individual installs malware, it will silently set up a mail server on an individual’s computer.

That computer will then be used to send out spam to millions of email addresses.

post continues after these free offers

a d v e r t i s e m e n t s

Today's Featured Free Offer

You're Doing it Wrong

Change Management for Your Organization

Change Management for Your Organization

I am a recovering change management consultant. Over the last 20 years or so, I’ve focused my career primarily in the people change management space. My job was to help companies realize the ROI of their multi-million dollar investments – whether they be investments in organizational redesign, new systems or large scale business transformations – by mitigating resistance, creating buy-in and driving adoption. The way to do that was to get the people on-board with what was happening. If they stopped resisting what was inevitable and just adopted the change, then all would be right in the “corporate” world. And I use the term “corporate” as a catch-all. These challenges and my project work spanned industries and organizations, from non-profit and government to privately owned and publicly traded enterprises.

The challenge is and always will be people. People will make or break the success of any change a company wants to make. So my job was part data analysis, part coaching, part writing, part training and part shrink. Get into the heads of the people to figure out what they wanted and find a way to make this change something they want. Or better yet – need. Call it marketing. Call it change management. Call it what you want. No matter how you slice and dice it, or whatever you call it, I was doing it wrong. And so are you.

If we apply the “Ask, Listen and Do” mindset to this problem, we as change management professionals can increase our effectiveness while enabling organizations to actually realize the ROI of their big dollar investments.

Let’s look at 2 different change management models to see the difference and similarities: Lewin's Change Management Model and Prosci's ADKAR Model and 3-Phase Process.

Offered Free by: POPin

More Free Offers to Consider:

Recommended by Recommended by NetLine

Click Here to View More Selections In Our Resource Library

a d v e r t i s e m e n t

post continues from above

Competition within the Hacker’s World

In many cases, hackers get a commission based on the number of successful referrals they can make through a spam site.

Most spam is based around online pharmacies.

When an individual buys products from an illicit online pharmacy, he or she will send money to a private company.

This company will send some of that money to the spammer that made the referral.

The Latest Hack Type is Cunning, Devious, Destructive

Though it has been around for a while, lately ransomware has taken on a new life as hackers become more sophisticated and clever in their ways.

The ransomware gets into your machine by a very professional looking email or popup that points to something you need — they have learned what you need from planting and/or tapping into your cookies earlier.

As the presentation and offer look legit, many will click for the download or click the email to open a web page.

Nothing much seems to happen after the download or web page is opened — however, your machine has already started an encryption process that only the hacker can undo.

And EVERY data file – txt, doc, docx, xls, xlsx, pdf, jpg, png, gif, yah-dah, yah-dah,-yah-dah — becomes encrypted and unusable unless you have the key.

Not just on the machine that initiated the ransomware, encryption occurs on every machine on the network to which that computer is attached.

And you won’t have the key unless you pay the ransom, which usually very expensive (from a few hundred to tens of thousands of dollars), which usually has to be paid within one week… or the ransom will double… or more.

Some have made the mistake of paying the ransom — and were attacked again…

The only out of all this is taking down your computer or your system (as a whole network will be affected not just one machine), format every machine, and restore every machine from backups.

Not very pretty — you do backup your system regularly, yes?


While cybercrime is a growing problem in the United States, there are many colleges that are teaching students about effective strategies to safeguard against hacking.

In addition, there are many ways that a human resource manager can guard against employee behaviors that can increase the risk of a hacking incident.

Subscribe to The HRIS World Newsletters
Click the image to start your newsletters now!

Our Social Media Presence

Where to Follow Us

socmedicons Where to Follow Us!

NEW:   Flipboard Magazines
More than 20 magazines and smart magazines to follow - check them out now!
Open Group | Free Minds membership required
Google +

What Is MyLibrary?
a d v e r t i s e m e n t s
Whether PC or Mobile, you need to protect your data and your machine...
a d v e r t i s e m e n t s
(Visited 401 times in the last 4 wks, 20 visits today)
The following two tabs change content below.

Garrett O'Brien

CEO, Chairman, Publisher, Editor at The HRIS World Research Group

Garrett is the publisher, editor, writer forThe HRIS World Research Group, which includes The HRIS World, The HRIS World Research, The HRIS World Jobs, The HRIS World News, and The HRIS World Videos

With more than 20 years in roles as a client executive sponsor (#thwCES), project manager as well as functional / technical lead, Garrett is sought for his expertise for project insights, thought leadership, and team management globally.

He has been involved in large-scale and complex implementations since 1991 and has recently moved his operations to be with his wife in Brazil.

Garrett has had the pleasure of working with some of the greatest talents in the industry, and constantly shares his experiences and knowledge through content and webinars.

He maintains his fluency in Portuguese, German, French, and English with his various endeavors and contacts..

When not working, you will have to be adventurous to stay up with him as Garrett loves motorcycling, gunnery, boating, sailing, flying, and sports fishing -- and accompanying his wife on her various likes

About The HRIS World Research Group

The HRIS World blog, which is read by more than 50,000 from more than 160 countries monthly, manages to have more than 550,000 pages viewed monthly. 40%+ of the audience are decision-makers in their organization (and about half of that being C-levels!).

As CEO for CGServices USA Inc, he focuses on multi-provider, multi-line implementations consultation for HRIS systems

Council and Education Member of Gerson Lehrman Group Council, helping institutions of the world leaders meet, engage and manage experts across a wide range of sectors and disciplines.

Your Invite to Contribute to The HRIS World blog

If you'd like to provide a post, a series of posts, or even be a regular contributor to any of The HRIS World blogs, click the blue contact us button on the bottom right of your screen to send us a message or reach us through our social media for details...

You can always contact Garrett via email, social media, or by leaving a comment below...

Share with your networks:
Posted in ERP, internet, Ramblings, security, The HRIS World, The HRIS World Research and tagged , , , .

Comments & Recommended Content via Disqus